<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTP ACCESS enbled by implied rule in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75504#M15313</link>
    <description>&lt;P&gt;So it is not gateway originated connection, the other way around.&lt;/P&gt;
&lt;P&gt;Firstly, having http port open does not mean vulnerability.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;GW may have one or more portals: WebUI, Mobile Access, Identity Awareness, etc. Those are also needed for functioning correctly. If you are concerned with WebUI being accessed from outside of protected perimeter, you can change the port and interfaces it is available through on GW object, Portals tab&lt;/P&gt;</description>
    <pubDate>Mon, 17 Feb 2020 14:57:38 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2020-02-17T14:57:38Z</dc:date>
    <item>
      <title>HTTP ACCESS enbled by implied rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75494#M15306</link>
      <description>&lt;P&gt;Hello all.&lt;/P&gt;&lt;P&gt;I noticed that HTTP access to each of nodes in a cluster is enabled by implied rules.&lt;/P&gt;&lt;P&gt;Is there a way to disable it? Maybe locally because the customer have 5 clusters under the same Management and I would like to avoid global changes...&lt;/P&gt;&lt;P&gt;Below the enabled blades and the log row.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;BR /&gt;Regards.&lt;/P&gt;&lt;P&gt;Stefano.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2020-02-17 11_52_48-mRemoteNG - confCons.xml - S-MI-SVIL.png" style="width: 528px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4463i74F4E271FC1CCC5A/image-dimensions/528x251?v=v2" width="528" height="251" role="button" title="2020-02-17 11_52_48-mRemoteNG - confCons.xml - S-MI-SVIL.png" alt="2020-02-17 11_52_48-mRemoteNG - confCons.xml - S-MI-SVIL.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2020-02-17 10_35_44-mRemoteNG - confCons.xml - S-MI-SVIL.png" style="width: 526px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4464i5A2185703C4CE78C/image-dimensions/526x397?v=v2" width="526" height="397" role="button" title="2020-02-17 10_35_44-mRemoteNG - confCons.xml - S-MI-SVIL.png" alt="2020-02-17 10_35_44-mRemoteNG - confCons.xml - S-MI-SVIL.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2020 13:47:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75494#M15306</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2020-02-17T13:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP ACCESS enbled by implied rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75496#M15308</link>
      <description>&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115600&amp;amp;partition=General&amp;amp;product=SmartConsole" target="_blank"&gt;sk115600: How to view &lt;STRONG&gt;Implied&lt;/STRONG&gt; &lt;STRONG&gt;Rules&lt;/STRONG&gt; in R80.x SmartConsole&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk43401&amp;amp;partition=General&amp;amp;product=Security" target="_blank"&gt;sk43401: How to completely disable FireWall &lt;STRONG&gt;Implied&lt;/STRONG&gt; &lt;STRONG&gt;Rules&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2020 13:51:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75496#M15308</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-02-17T13:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP ACCESS enbled by implied rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75498#M15309</link>
      <description>&lt;P&gt;Yes, GWs are allowed to open outgoing connections via implied rules. This is usually required for normal functions. If you change that, some features: AVI &amp;amp; IPS updates, URL and AC categorization and others, may not work.&lt;BR /&gt;&lt;BR /&gt;Why are you concerned with this in the first place?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2020 14:03:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75498#M15309</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-02-17T14:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP ACCESS enbled by implied rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75503#M15312</link>
      <description>Hi Val_Loukine, thanks for your answer.&lt;BR /&gt;A vulnerability scan found the HTTP port open and has it been marked as weakness, the customer asked to close it....</description>
      <pubDate>Mon, 17 Feb 2020 14:49:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75503#M15312</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2020-02-17T14:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP ACCESS enbled by implied rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75504#M15313</link>
      <description>&lt;P&gt;So it is not gateway originated connection, the other way around.&lt;/P&gt;
&lt;P&gt;Firstly, having http port open does not mean vulnerability.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;GW may have one or more portals: WebUI, Mobile Access, Identity Awareness, etc. Those are also needed for functioning correctly. If you are concerned with WebUI being accessed from outside of protected perimeter, you can change the port and interfaces it is available through on GW object, Portals tab&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2020 14:57:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75504#M15313</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-02-17T14:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP ACCESS enbled by implied rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75658#M15346</link>
      <description>Thanks, I'll check the active (and needed) modules.&lt;BR /&gt;&lt;BR /&gt;Regards.</description>
      <pubDate>Wed, 19 Feb 2020 07:09:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-ACCESS-enbled-by-implied-rule/m-p/75658#M15346</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2020-02-19T07:09:34Z</dc:date>
    </item>
  </channel>
</rss>

